IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 174  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
EA, EMM, ASJ-H 2022-11-21
10:00
Online Online [Poster Presentation] ConvMixer model transformation using random orthogonal matrices for privacy protection of test images.
Rei Aso, Tatsuya Chuman, Hitoshi Kiya (TMU) EA2022-49 EMM2022-49
 [more] EA2022-49 EMM2022-49
pp.46-51
CAS, SIP, VLD, MSS 2022-06-16
14:15
Aomori Hachinohe Institute of Technology
(Primary: On-site, Secondary: Online)
Access control of ConvMixer models based on patch embedding structure
Ryota Iijima, Hitoshi Kiya (Tokyo Metro. Univ.) CAS2022-6 VLD2022-6 SIP2022-37 MSS2022-6
 [more] CAS2022-6 VLD2022-6 SIP2022-37 MSS2022-6
pp.28-33
CAS, SIP, VLD, MSS 2022-06-16
14:40
Aomori Hachinohe Institute of Technology
(Primary: On-site, Secondary: Online)
Adversarial Robustness of Secret Key-Based Defenses against AutoAttack
Miki Tanaka, April Pyone MaungMaung (Tokyo Metro Univ.), Isao Echizen (NII), Hitoshi Kiya (Tokyo Metro Univ.) CAS2022-7 VLD2022-7 SIP2022-38 MSS2022-7
Deep neural network (DNN) models are well-known to easily misclassify prediction results by using input images with smal... [more] CAS2022-7 VLD2022-7 SIP2022-38 MSS2022-7
pp.34-39
CAS, SIP, VLD, MSS 2022-06-16
15:05
Aomori Hachinohe Institute of Technology
(Primary: On-site, Secondary: Online)
Image Classification Using Vision Transformer for Compressible Encrypted Images
Genki Hamano, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metropolitan Univ.) CAS2022-8 VLD2022-8 SIP2022-39 MSS2022-8
In this paper, we propose an image classification method for compressible encrypted images without losing classification... [more] CAS2022-8 VLD2022-8 SIP2022-39 MSS2022-8
pp.40-45
SIP, BioX, IE, MI, ITE-IST, ITE-ME [detail] 2022-05-19
10:40
Kumamoto Kumamoto University Kurokami Campus
(Primary: On-site, Secondary: Online)
N-white balancing: white balance adjustment for adjusting multi-illuminant scenes
Teruaki Akazawa, Yuma Kinoshita, Hitoshi Kiya (Tokyo Metro. Univ.) SIP2022-5 BioX2022-5 IE2022-5 MI2022-5
This paper presents a novel white balance adjustment for multi-illuminant scenes, called ``N-white balancing.'' N is the... [more] SIP2022-5 BioX2022-5 IE2022-5 MI2022-5
pp.25-30
EMM 2022-03-07
15:55
Online (Primary: Online, Secondary: On-site)
(Primary: Online, Secondary: On-site)
[Poster Presentation] Video Forgery Detection Using a Robust Hashing Algorithm
Shoko Niwa, Miki Tanaka, Hitoshi Kiya (Tokyo Metro. Univ.) EMM2021-102
In this paper, we propose a method to detect the editing of video signals using a robust hashing algorithm. The assumed ... [more] EMM2021-102
pp.58-63
EMM 2022-03-07
16:35
Online (Primary: Online, Secondary: On-site)
(Primary: Online, Secondary: On-site)
Access Control of Vision Transformer models without performance degradation
Ryota Iijima, Yuma Kinoshita, Hitoshi Kiya (Tokyo Metro. Univ.) EMM2021-104
In this paper, we propose a novel access control method to protect trained models from unauthorized access. Conventional... [more] EMM2021-104
pp.70-75
EMM 2022-03-07
17:00
Online (Primary: Online, Secondary: On-site)
(Primary: Online, Secondary: On-site)
Extention of robust image classification system with Adversarial Example Detectors
Miki Tanaka, Takayuki Osakabe, Hitoshi Kiya (Tokyo Metro. Univ.) EMM2021-105
In image classification with deep learning, there is a risk that an attacker can intentionally manipulate the prediction... [more] EMM2021-105
pp.76-80
EMM 2022-03-08
10:25
Online (Primary: Online, Secondary: On-site)
(Primary: Online, Secondary: On-site)
[Poster Presentation] Influence of Data Hiding in Etc-Image Classification with SVM
Kosuke Abe, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metropolitan Univ.) EMM2021-112
Classification accuracy for Encryption-then-Comperssion (EtC) images by support vector machine(SVM) is comparable to tha... [more] EMM2021-112
pp.107-111
EA, SIP, SP, IPSJ-SLP [detail] 2022-03-02
12:00
Okinawa
(Primary: On-site, Secondary: Online)
Evaluating the robustness of signal processing-based pseudonymization using parameter optimization against inversion attack.
Hiroto Kai (Tokyo Metro. Univ.), Shinnosuke Takamichi (The Univ. of Tokyo), Sayaka Shiota, Hitoshi Kiya (Tokyo Metro. Univ.) EA2021-82 SIP2021-109 SP2021-67
 [more] EA2021-82 SIP2021-109 SP2021-67
pp.114-119
EA, SIP, SP, IPSJ-SLP [detail] 2022-03-02
13:25
Okinawa
(Primary: On-site, Secondary: Online)
[Poster Presentation] Multi-channel missing signals recovery using autoencoder for acoustic scene classification
Yuki Shiroma, Yuma Kinoshita (Tokyo Metro. Univ.), Keisuke Imoto (Doshisha Univ.), Sayaka Shiota, Nobutaka Ono, Hitoshi Kiya (Tokyo Metro. Univ.) EA2021-86 SIP2021-113 SP2021-71
 [more] EA2021-86 SIP2021-113 SP2021-71
pp.140-145
EMM 2022-01-27
13:00
Online Online Enhancing robustness of image classification system with Adversarial Example Detector
Takayuki Osakabe, Maungmaung Aprilpyone, Hitoshi Kiya (TMU) EMM2021-84
 [more] EMM2021-84
pp.1-6
EMM 2022-01-27
13:25
Online Online Access Control Using Feature Map Transformation With Secret Key for Object Detection Models
Teru Nagamori, Hiroki Ito, MaungMaung AprilPyone, Hitoshi Kiya (Tokyo Metro. Univ.) EMM2021-85
In this paper, we propose an access control method for object detection models.
The use of transformed images or transf... [more]
EMM2021-85
pp.7-12
EMM, EA, ASJ-H 2021-11-15
09:00
Online Online [Poster Presentation] A consideration of training datasets for universal detectors of CNN-generated images
Miki Tanaka, Hitoshi Kiya (Tokyo Metro. Univ.) EA2021-32 EMM2021-59
Recent rapid advances in convolutional neural networks (CNNs) have made manipulating and generating images easy, so synt... [more] EA2021-32 EMM2021-59
pp.31-36
SIS, ITE-BCT 2021-10-07
14:25
Online Online Block-wise Transformation with Secret Key for Adversary Robust Defence of SVM model
Ryota Iijima, MaungMaung AprilPyone, Hitoshi Kiya (TMU) SIS2021-13
In this paper, we propose a method for implementing support vector machine (SVM) models that are robust against adversar... [more] SIS2021-13
pp.17-22
SP, IPSJ-SLP, IPSJ-MUS 2021-06-19
15:00
Online Online Investigation on fine-tuning with image classification networks for deep neural network-based musical instrument classification
Yuki Shiroma, Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya (TMU) SP2021-17
In this paper, we investigate abilities of channel conversion methods for fine-tuning with image classification networks... [more] SP2021-17
pp.75-79
EMM, IT 2021-05-20
14:35
Online Online A universal detector of CNN-generated images based on properties of checkerboard artifacts
Miki Tanaka, Hitoshi Kiya (Metro Univ.) IT2021-3 EMM2021-3
We propose a universal detector of images generated by using any CNNs to detect CNN-generated images.
We consider prope... [more]
IT2021-3 EMM2021-3
pp.13-18
EMM, IT 2021-05-21
14:00
Online Online An MSB Prediction-Based Method with Less Prediction Errors for Reversible Data Hiding in Encrypted Images
Kotaro Yamamura, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metropolitan Univ.) IT2021-13 EMM2021-13
In this paper, we propose an MSB prediction-based reversible data hiding method in encrypted images. The proposed method... [more] IT2021-13 EMM2021-13
pp.72-77
EMM, IT 2021-05-21
14:25
Online Online A reversible data hiding method with high flexibility in compressive encrypted images
Ryota Motomura, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metropolitan Univ.) IT2021-14 EMM2021-14
In this paper, we propose a reversible data hiding method in encrypted images, where both the com-pression efficiency an... [more] IT2021-14 EMM2021-14
pp.78-83
EMM 2021-03-05
09:30
Online Online An MSB Prediction-Based Method Using Linear Regression for Reversible Data Hiding in Encrypted Images
Kotaro Yamamura, Ryoichi Hirasawa, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metropolitan Univ.) EMM2020-75
In this paper, we propose an MSB prediction-based reversible data hiding method using linear regression in encrypted dom... [more] EMM2020-75
pp.46-51
 Results 1 - 20 of 174  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan